Summary

This chapter presented defense in depth as a solution to secure a business network. Defense in depth is a concept using layers of defense to mitigate computer and network attacks. Those who fully deployed defense in depth were protected from the major worms and viruses that hit the Internet in recent years.

The basic building blocks of defense in depth are as follows:

  • Authentication— Control who gains access to your network by deploying username and password authentication along with access control.

  • Perimeter security— Expose only Internet addresses that you choose and control access to those services (usually public servers such and web and DNS servers). Perimeter security also provides DDoS protection for your security appliance.

Get Securing Your Business with Cisco ASA and PIX Firewalls now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.